
Coursera
Skills you'll gain: Responsible AI, AI Security, Data Ethics, AI Integrations, Telehealth, Health Technology, Generative AI, Health Insurance Portability And Accountability Act (HIPAA) Compliance, Healthcare Ethics, Regulatory Compliance, Health Care Procedure and Regulation, Security Strategy, Medical Privacy, AI Workflows, Data Security, Analysis, Risk Analysis, Innovation, Design
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Patch Management, Data Security, Cloud Security, Amazon Web Services, Data Governance, Cyber Governance, Cloud Management, Key Management, Encryption, IT Automation, Public Key Infrastructure, Configuration Management
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Google Gemini, Gemini, Cloud Deployment, Google Cloud Platform, AI Security, Cloud Security, Generative AI Agents, Vulnerability Assessments, Security Strategy
Beginner · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Cloud Deployment, Google Gemini, Google Cloud Platform, Gemini, AI Security, Generative AI, Cloud Security, System Configuration, Security Management, Vulnerability Assessments
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Security Testing, Cloud Security, Cyber Security Assessment, Penetration Testing, Microsoft Azure, Exploitation techniques, Security Controls, Azure Active Directory, Brute-force attacks, Email Security, Cloud Storage, Authentications, User Accounts, Identity and Access Management
Intermediate · Course · 1 - 3 Months

Universiteit Leiden
Skills you'll gain: Risk Management, Safety and Security, Security Management, Threat Management, Case Studies, Computer Security Incident Management, Public Safety and National Security, Risk Analysis, Cybersecurity, Incident Management, International Relations, Crisis Intervention, Policy Analysis, Governance, Public Policies
Beginner · Course · 1 - 3 Months

Skills you'll gain: Routing Protocols, Network Security, Network Routing, TCP/IP, Network Administration, Open Shortest Path First (OSPF), Network Protocols, Network Switches, Virtual Local Area Network (VLAN), Network Monitoring, Firewall, Network Infrastructure, Network Troubleshooting, Border Gateway Protocol, Network Performance Management, Security Controls, Network Analysis, Authentications, Encryption
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Cloud Security, Threat Management, Vulnerability Management, Identity and Access Management, Data Security, Cloud-Native Computing, Infrastructure as Code (IaC), Authentications, Cloud Computing, Vulnerability Assessments, Cyber Attacks, Multi-Factor Authentication, Data Governance, Key Management, Security Management, Authorization (Computing), Containerization, Network Analysis
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cloud Deployment, Microsoft Azure, Cloud Applications, Application Deployment, Application Programming Interface (API), Authentications, Payment Systems, Authorization (Computing), Email Security, Role-Based Access Control (RBAC), UI Components, Identity and Access Management, Email Automation, Database Management, Transaction Processing, User Interface (UI)
Advanced · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, DevSecOps, Application Security, Vulnerability Management, Security Testing, Penetration Testing, Security Awareness, Security Strategy, DevOps, Security Management, Computer Security Awareness Training, Technology Roadmaps, Risk Management Framework
Intermediate · Course · 1 - 3 Months

Hebrew University of Jerusalem
Skills you'll gain: Computer Science, Computer Systems, Computer Architecture, Computer Programming, Programming Principles, Memory Management, System Software, System Programming, Virtual Machines, Operating Systems, Hardware Architecture, Software Architecture, Algorithms, Software Design, Program Development, Object Oriented Programming (OOP), Data Structures, Computer Graphics, Peripheral Devices
Mixed · Course · 1 - 3 Months
Starweaver
Skills you'll gain: Endpoint Security, Endpoint Detection and Response, Threat Detection, Zero Trust Network Access, Cyber Threat Hunting, MITRE ATT&CK Framework, Cyber Threat Intelligence, Intrusion Detection and Prevention, Hardening, IT Security Architecture, Threat Management, Cybersecurity, Security Controls, Continuous Monitoring, Human Factors (Security), Event Monitoring, Anomaly Detection, System Monitoring, Authentications, Virtual Machines
Intermediate · Course · 1 - 3 Months